A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.
References
Link | Resource |
---|---|
https://gist.github.com/omriinbar/1e28649f31d795b0e9b7698a9d255b5c | Third Party Advisory |
https://github.com/filebrowser/filebrowser | Product Third Party Advisory |
https://github.com/filebrowser/filebrowser/commit/201329abce4e92ae9071b9ded81e267aae159fbd | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-08-31 18:15
Updated : 2021-09-08 17:27
NVD link : CVE-2021-37794
Mitre link : CVE-2021-37794
CVE.ORG link : CVE-2021-37794
JSON object : View
Products Affected
filebrowser_project
- filebrowser
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')